Various Cryptography algorithms are used to keep the transmission of data safe from intruder and to
secure the connection between sender and receiver. This article provides an overview of ECC, including the
algorithm process, fundamental protocols, and different ECC systems and applications. EC over fields also represents
by numerous graphical representations of cryptographic processes. Comparison tables are included that list the ratio
of key size between ECC and RSA (the nearest method to ECC), in factors of overhead, power availability and
required storage, which indicates fast running with less bandwidth in case of elliptic curve method. In the other hand
some previous works related to the topic were compared according to the functions of properties, measurement
methods, and type of the data used, results were collected in traceable manner for the purpose of making it available
to researchers and those interested in ECC.